Simon

111 posts

Simon banner
Simon

Simon

@sim0nsecurity

2025 Microsoft MVR-2024 Q1/2/3/4/MVR | 2023 H1-4420. Vulnerability researcher @msftsecresponse,@Hacker0x01 and @intigriti,I like pwning,together we hit harder

Присоединился Mayıs 2022
192 Подписки397 Подписчики
Simon
Simon@sim0nsecurity·
@XenonOracle @martenmickos Hey bro...as Martin Luther King Jr. said, "We must accept finite disappointment, but never lose infinite hope." don't blame dreams for poor expectations.
English
0
0
0
12
Xenon
Xenon@XenonOracle·
@martenmickos It’s true that bug bounty can be life changing for some people but it’s also true it has destroyed the mental health of a lot of people. Please don’t sell dreams.
English
1
0
3
143
Mårten Mickos
Mårten Mickos@martenmickos·
Bug bounty changed my life, says VigilShooter. "They have paid out 15K in total which completely changed my life. I got a car with that money, paid for my kids tuition this year, and paid off my last debt. " bugbounty.forum/post/c80a5a0f-…
Mårten Mickos tweet media
English
2
7
124
5.9K
Simon
Simon@sim0nsecurity·
@martenmickos Shoutout to you and HackerOne! So many researchers have succeeded and had their lives changed. Truly amazing!
English
0
0
0
206
Simon ретвитнул
POC_Crew
POC_Crew@POC_Crew·
[POC2025] SPEAKER UPDATE 👥 Bocheng Xiang(@crispr_x) & HeeChan Kim(@heegong123) - "Follow the Link: Building Full-Chain Local Privilege Escalation on Windows" #POC2025
POC_Crew tweet media
English
0
5
51
10.1K
Simon
Simon@sim0nsecurity·
I'm very happy to receive this gift from MSRC @msftsecresponse. Although vulnerability research can be challenging, if you stay passionate, work hard, and persevere, your efforts will always be rewarded. Good luck to all!
Simon tweet mediaSimon tweet media
English
1
0
11
696
Simon
Simon@sim0nsecurity·
@Hack_All_Things RIP. Roy you'll be deeply missed 🙏. Thank you for everything you did for us.
English
0
0
1
351
Roy Davis
Roy Davis@Hack_All_Things·
Peace out world. Best wishes to all. ALS has won this battle, but hopefully not the war!
Roy Davis tweet media
English
131
59
1.6K
146.6K
Simon
Simon@sim0nsecurity·
@steventseeley @edwardzpeng Yuki is an excellent researcher who has achieved great success at MSRC. I imagine he's very grateful to the MSRC team.
English
0
0
0
126
Simon
Simon@sim0nsecurity·
@edwardzpeng Consider the situation from MSRC's perspective for a moment. Is it possible that their conclusion is justified?
English
0
0
0
322
Simon ретвитнул
ö
ö@r0keb·
Good Morning! Just published a blog post diving into Windows Kernel LFH exploitation in the latest Windows 24h2 build, Focusing on controlled allocations to achieve arbitrary read/write in the kernel. r0keb.github.io/posts/Modern-(…
English
4
77
311
19.8K
Roy Davis
Roy Davis@Hack_All_Things·
I am honored and humbled to have received this lifetime achievement award today from @Hacker0x01 . When I began working with the bug bounty team at @salesforce in 2016, I was a total noob. I quickly identified an unknown passion for it, and have never looked back. I continued my career at @Zoom in 2020, where I am today. I am grateful to so many influential mentors along the way, including Angelo Prado, Emre Saglam, Adam Ruddermann, Andy Grant, Annika Carr, Sandra McLeod, Crystal Hazen, Martijn Russchen, and countless others. And to the hundreds of ethical hackers and security researchers I have had the honor to work with, and many who I have become friends with, thank you for your tireless work, dedication, and gracious professionalism. Thank you @Hacker0x01 for this recognition. I know I am not always the easiest guy to work with, and I truly appreciate everyone who has put up with me over the years. Peace and love to all.
Roy Davis tweet media
English
25
4
283
14.5K
Simon
Simon@sim0nsecurity·
@osipov_ar Great find! Congrats! Do these qualify for a bounty?
English
1
0
2
216
Simon ретвитнул
TrendAI Zero Day Initiative
An analysis of CVE-2024-44236 - an RCE in macOS due to the lack of proper validation of “lutAToBType” and “lutBToAType” tag types. Read the details, see the source code review, and get detection guidance at zerodayinitiative.com/blog/2025/5/7/…
English
0
35
93
11.1K
Simon
Simon@sim0nsecurity·
@tunadv Thank you!
English
0
0
1
491
Simon ретвитнул
TrendAI Zero Day Initiative
CVE-2024-43639: Remote Code Execution in Microsoft Windows KDC Proxy. The Trend Research Team dives deep into this bug to look at the root cause and complexities of exploitation. They also provide detection guidance. Read the details at zerodayinitiative.com/blog/2025/3/3/…
English
4
53
157
13.9K
Simon
Simon@sim0nsecurity·
@Sakana_Walnut Apologies here, but due to policy restrictions, I am unable to disclose information about this vulnerability.
English
0
0
0
38
Wa1nut4
Wa1nut4@Sakana_Walnut·
@sim0nsecurity Will you share some detail about this? I'm only familiar with chromium, so I only know the attack surface that is migrated from chromium. Thanks👀
English
1
0
0
43